First published: Tue Apr 02 2019(Updated: )
It was discovered that Firebird incorrectly handled certain malformed packets. A remote attacker could possibly use this issue with a specially crafted network packet to cause Firebird to crash, resulting in a denial of service. (CVE-2014-9323) It was discovered that Firebird incorrectly handled certain UDF libraries. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2017-6369)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/firebird2.5-classic | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/firebird2.5-classic-common | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/firebird2.5-server-common | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/firebird2.5-super | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/firebird2.5-superclassic | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libfbclient2 | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libfbembed2.5 | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/libib-util | <2.5.2.26540.ds4-9ubuntu1.1 | 2.5.2.26540.ds4-9ubuntu1.1 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3929-1 is classified as high due to the potential for denial of service caused by malformed network packets.
To fix USN-3929-1, update the affected packages to version 2.5.2.26540.ds4-9ubuntu1.1 or later.
USN-3929-1 affects Firebird database software versions prior to 2.5.2.26540.ds4-9ubuntu1.1 on Ubuntu 14.04.
Yes, USN-3929-1 can be exploited remotely by attackers sending specially crafted network packets.
The implications of USN-3929-1 include potential service outages or crashes due to denial of service vulnerabilities.